09
Computer software and hardware for digital security;
computer security products, namely, computer peripherals;
computer hardware and software, namely, network security
appliances, email security appliances, digital data and
media security appliances, security software applications,
and management stations for network security; computer
software and computer hardware for detection, blocking, and
facilitating removal and remediation of computer viruses,
rootkits, bootkits, backdoors, zero-day attacks, data
exfiltration, phishing, bots, time bombs, worms,
cyber-attacks, malicious attacks, and advanced persistent
threats; computer software for identifying and preventing
malicious attacks on, and unauthorized activities and
intrusions in computers, computer systems, networks,
hardware, software applications, digital devices, and mobile
devices; computer software and hardware for providing secure
networks, virtual computer systems and virtual computer
environments; computer hardware; computer peripherals
42
Technical support and consulting services related to
security and vulnerability of, and cyber-attacks and threats
against computers, computer systems, networks, hardware,
software applications, digital devices, digital data, and
mobile devices; technical installation and support and
consulting services related to designing, developing,
customizing, configuring, deploying, installing,
maintaining, analyzing, integrating, repairing, and managing
of cyber-security systems for others; technical support
services in the nature of detecting and diagnosing computer
hardware and software security problems and vulnerabilities,
updating and maintenance of computer software relating to
computer security and to prevention and mitigation of
computer risks; updating and maintaining computer software
for others; cloud computing services featuring software and
databases for use in computer security and prevention and
mitigation of computer risks; computer consultation and
research in the field of network security; computer security
consultancy in the field of malware, intrusion and
penetration testing and diagnosis of computers and networks
to assess information technology security and vulnerability;
information technology security services in the nature of
providing network access to cyber-threat intelligence, to
cyber-attack verification, and to security analysis of
network traffic, emails, files, media computer software, and
mobile applications; application service provider (ASP)
featuring software for use for detection, blocking, and
facilitating removal and remediation of computer viruses,
rootkits, advanced persistent threats, malware and malicious
attacks in computers, computer systems, networks, hardware,
software applications, digital devices, and mobile digital
devices; application service provider (ASP) featuring
software that provides secure virtual computer systems and
virtual computing environments; on demand computer software
consulting services; computer virus protection services;
provision of technical information on demand in relation to
the implementation and use of computers, computer hardware
and computer software; providing on demand in-home and
in-office technology support services in the areas of IT
infrastructure support, data backup services, virus spyware
removal services, and computer security consultancy;
computer network design and configuration for others;
maintenance and updating of computer software
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen